Quoting Stephen Smalley (sds@xxxxxxxxxxxxxx): > On Fri, 2009-06-19 at 20:32 -0500, Serge E. Hallyn wrote: > > diff --git a/ipc/checkpoint_msg.c b/ipc/checkpoint_msg.c > > index 51385b0..ca55339 100644 > > --- a/ipc/checkpoint_msg.c > > +++ b/ipc/checkpoint_msg.c > <snip> > > @@ -175,11 +183,26 @@ static int load_ipc_msg_hdr(struct ckpt_ctx *ctx, > > struct msg_queue *msq) > > { > > int ret = 0; > > + int secid = 0; > > > > ret = restore_load_ipc_perms(&h->perms, &msq->q_perm); > > if (ret < 0) > > return ret; > > > > + if (h->perms.secref) { > > + struct sec_store *s; > > + s = ckpt_obj_fetch(ctx, h->perms.secref, CKPT_OBJ_SECURITY); > > + if (IS_ERR(s)) > > + return PTR_ERR(s); > > + secid = s->secid; > > + } > > + ret = security_msg_queue_alloc(msq); > > + if (ret) > > + return ret; > > + ret = security_msg_queue_restore(msq, secid); > > + if (ret < 0) > > + return ret; > > I don't think you want to call security_msg_queue_alloc() here, as that > both allocates the security struct and performs the create check. So I > would just call the _restore() function, and let it internally call > ipc_alloc_security() to allocate the struct but then apply its own > distinct restore check. Likewise for the rest of them. Ok, will change that. > Also, where do we get to veto attempts to checkpoint the task in the > first place? If ptrace, I think we'd want it treated as a > PTRACE_MODE_ATTACH (also used for /proc/pid/mem) rather than just > PTRACE_MODE_READ (reading other /proc/pid info). The checkpointing of ipc objects goes through an ipcperms(perm, S_IROTH) check in ipc/checkpoint (at top of http://git.ncl.cs.columbia.edu/?p=linux-cr.git;a=blob;f=ipc/checkpoint.c;h=88996e2b7abf328bd1b263400798ed5bd4924f48;hb=HEAD ) But yes, for the task itself we check PTRACE_MODE_READ (line 280 in http://git.ncl.cs.columbia.edu/?p=linux-cr.git;a=blob;f=checkpoint/checkpoint.c;h=a6dee4fb1085a47095f24443c48683a7fbc8ac59;hb=HEAD ) I had thought that PTRACE_MODE_ATTACH implied the permission to actually modify the task. If it also can imply a "very invasive" read then changing it certainly seems right. thanks, -serge -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.